R. Kinney Williams - Yennik, Inc.®
R. Kinney Williams
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc. the acknowledged leader in Internet auditing for financial institutions.

September 28, 2014

CONTENT Internet Compliance Web Site Audits
IT Security
 
Internet Privacy
 
Penetration Testing
 
Does Your Financial Institution need an affordable Internet security audit?  Yennik, Inc. has clients in 42 states that rely on our penetration testing audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) The penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world weaknesses.  For more information, give R. Kinney Williams a call today at 806-798-7119 or visit http://www.internetbankingaudits.com/.


REMINDER -
This newsletter is available for the Android smart phones and tablets.  Go to the Market Store and search for yennik.

FYI - Don't forget to follow me on LinkedIn at https://www.linkedin.com/in/yennik where I post a weekly question on IT security/audit.

FYI - IT security shifts from prevention to resiliency - The discussion on cybersecurity has shifted as CIOs and CTOs come to the realization that no system is immune to attacks and breaches. The conversation is now about “cyber resiliency.” http://www.federaltimes.com/article/20140922/CYBER/309220008/IT-security-shifts-from-prevention-resiliency

FYI - GAO - Consumer Financial Protection Bureau: Some Privacy and Security Procedures for Data Collections Should Continue Being Enhanced. http://www.gao.gov/products/GAO-14-758

FYI - Breached HealthCare.gov Server Still Had Default Password - A HealthCare.gov test server still had a default password when it was hacked in July, a Department of Homeland Security official told Congress Thursday. http://www.nextgov.com/health/2014/09/breached-healthcaregov-server-still-had-default-password/94490/?oref=ng-channelrivers

FYI - Beazley: employee errors root of most data breaches, but malware incidents cost more - Insurance firm Beazley analyzed more than 1,500 data breaches it serviced between 2013 and 2014, and found that the majority of the incidents were caused by unintended disclosures, via email or fax for instance, or by physical loss of paper records. http://www.scmagazine.com/beazley-employee-errors-root-of-most-data-breaches-but-malware-incidents-cost-more/article/372679/

FYI - Mobile device security sacrificed for productivity, study says - Productivity is driving the use of mobile devices in the workplace, and a recent poll of IT and IT security pros found that one-third of employees use the devices exclusively for work – a figure expected to rise to 47 percent in the next year. http://www.scmagazine.com/mobile-device-security-sacrificed-for-productivity-study-says/article/372962/

FYI - Intrustion prevention systems made a comeback in 2013 - The intrusion prevention system (IPS) market that some security professionals deemed to be on the verge of extinction a few years ago has bounced back, growing 4.2 percent, or $1.35 billion, over the past year, according to a new study. http://www.scmagazine.com/report-intrustion-prevention-systems-made-a-comeback-in-2013/article/372967/

FYI - U.S. grid safe from large-scale attack, experts say - The specter of a large-scale, destructive attack on the U.S. power grid is at the center of much strategic thinking about cybersecurity. http://www.politico.com/story/2014/09/power-grid-safety-110815.html

FYI - GAO - Cloud Computing: Additional Opportunities and Savings Need to Be Pursued. http://www.gao.gov/products/GAO-14-753

FYI - Microsoft launches new bug bounty program - Microsoft launched its new Online Services Bug Bounty program earlier this week with the first project involving Office 365. http://www.scmagazine.com/microsofts-office-365-participates-in-new-bug-bounty-program/article/373587/

ATTACKS, INTRUSIONS, DATA THEFT & LOSS

FYI - China hacked US Army transport orgs TWENTY TIMES in ONE YEAR - FBI et al knew of nine hacks - but didn't tell TRANSCOM - Sophisticated Beijing-backed hackers raided civilian organisations responsible for the movements of US troops and equipment 20 times in one year of which only two were detected by the responsible agency, an audit report has found. http://www.theregister.co.uk/2014/09/18/china_hacked_us_army_twenty_times_in_one_year/

FYI - eBay addresses XSS issue affecting auction page visitors - A BBC report has revealed that an auction page on eBay.co.uk left visitors vulnerable to cross-site scripting (XSS) attacks. In an aim to take advantage of the security issue, scammers placed malicious Javascript code in the product listing page, so that users would be redirected to a phishing site, BBC said. http://www.scmagazine.com/ebay-addresses-xss-issue-affecting-auction-page-visitors/article/372422/

FYI - Hackers had access to Goodwill hosting provider for 18 months - C&K Systems, which provided payment technology to Goodwill, said two other businesses were also affected - Hackers evaded security systems for a year-and-a-half at a hosting center that processed payment cards for Goodwill Industries, using the same type of malware that struck Target and other major retailers to steal card data, according to the charity's software vendor. http://www.computerworld.com/article/2684180/hackers-had-access-to-goodwill-hosting-provider-for-18-months.html

FYI - China hacked US Army transport orgs TWENTY TIMES in ONE YEAR - FBI et al knew of nine hacks - but didn't tell TRANSCOM - Sophisticated Beijing-backed hackers raided civilian organisations responsible for the movements of US troops and equipment 20 times in one year of which only two were detected by the responsible agency, an audit report has found. http://www.theregister.co.uk/2014/09/18/china_hacked_us_army_twenty_times_in_one_year/

FYI - Chinese hackers breach 50 U.S. gov't contractors' systems in one year - Over the course of almost a year, Chinese hackers were able to target, attack and successfully penetrate government contractors' systems to steal sensitive information and, in one case, access systems onboard an American commercial ship. http://www.scmagazine.com/chinese-hackers-breach-50-us-govt-contractors-systems-in-one-year/article/372673/

FYI - Home Depot ignored staff warnings of security fail laundry list - Home Depot is facing claims it ignored security warnings from staff, who say prior to its loss of 56 million credit cards, it failed to update anti virus since 2007, did not consistently monitor its network for signs of attack, and failed to properly audit its eventually-hacked payment terminals. http://www.theregister.co.uk/2014/09/22/home_depot_ignored_staff_warnings_of_security_fail_laundry_list/

FYI - Home Depot’s former security architect had history of techno-sabotage - Now serving four-year federal sentence, Ricky Joe Mitchell spread viruses as teen. When Home Depot suffered a breach of transaction data that exposed as many as 52 million credit card transactions earlier this year, the company reportedly suffered from lax computer and network security measures for years. http://arstechnica.com/security/2014/09/home-depots-former-security-architect-had-history-of-techno-sabotage/

FYI - Home Depot ignored security employees' vulnerability warnings - Home Depot's security team knew of vulnerabilities in the retailer's systems years before its massive breach and issued multiple warnings to no avail, according to a recent report by The New York Times that sourced anonymous former Home Depot cybersecurity employees. http://www.scmagazine.com/home-depot-ignored-security-employees-vulnerability-warnings/article/372910/

FYI - Cyber attack on Japan Airlines impacts up to 750,000 - A phishing attack may have resulted in the theft of personal information belonging to customers of Japan Airlines's frequent flier club. http://www.scmagazine.com/japan-airlines-experiences-data-breach/article/373722/

FYI - Jimmy Johns confirms breach; 216 stores impacted - Jimmy John's confirmed a data breach this week and disclosed that approximately 216 stores were affected. http://www.scmagazine.com/jimmy-johnss-pos-systems-compromised/article/373688/

Return to the top of the newsletter

WEB SITE COMPLIANCE -
We continue covering some of the issues discussed in the "Risk Management Principles for Electronic Banking" published by the Basel Committee on Bank Supervision.
 

 
Principle 2: Banks should use transaction authentication methods that promote non-repudiation and establish accountability for e-banking transactions.
 
 
Non-repudiation involves creating proof of the origin or delivery of electronic information to protect the sender against false denial by the recipient that the data has been received, or to protect the recipient against false denial by the sender that the data has been sent. Risk of transaction repudiation is already an issue with conventional transactions such as credit cards or securities transactions. However, e-banking heightens this risk because of the difficulties of positively authenticating the identities and authority of parties initiating transactions, the potential for altering or hijacking electronic transactions, and the potential for e-banking users to claim that transactions were fraudulently altered.
 
 To address these heightened concerns, banks need to make reasonable efforts, commensurate with the materiality and type of the e-banking transaction, to ensure that: 
 
 1)  E-banking systems are designed to reduce the likelihood that authorized users will initiate unintended transactions and that customers fully understand the risks associated with any transactions they initiate.
 2)  All parties to the transaction are positively authenticated and control is maintained over the authenticated channel.
 3)  Financial transaction data are protected from alteration and any alteration is detectable.
 
Banking organizations have begun to employ various techniques that help establish non-repudiation and ensure confidentiality and integrity of e-banking transactions, such as digital certificates using public key infrastructure (PKI).  A bank may issue a digital certificate to a customer or counterparty to allow for their unique identification/authentication and reduce the risk of transaction repudiation. Although in some countries customers' rights to disclaim transactions is provided in specific legal provisions, legislation has been passed in certain national jurisdictions making digital signatures legally enforceable. Wider global legal acceptance of such techniques is likely as technology continues to evolve.

Return to the top of the newsletter

INFORMATION TECHNOLOGY SECURITY
-
We continue our series on the FFIEC interagency Information Security Booklet.  
 
SYSTEMS DEVELOPMENT, ACQUISITION, AND MAINTENANCE - HOST AND USER EQUIPMENT ACQUISITION AND MAINTENANCE
 
System Patches
 
Software support should incorporate a process to update and patch operating system and application software for new vulnerabilities. Frequently, security vulnerabilities are discovered in operating systems and other software after deployment. Vendors often issue software patches to correct those vulnerabilities. Financial institutions should have an effective monitoring process to identify new vulnerabilities in their hardware and software.  Monitoring involves such actions as the receipt and analysis of vendor and governmental alerts and security mailing lists. Once identified, secure installation of those patches requires a process for obtaining, testing, and installing the patch.
 
 Patches make direct changes to the software and configuration of each system to which they are applied. They may degrade system performance. Also, patches may introduce new vulnerabilities, or reintroduce old vulnerabilities. The following considerations can help ensure patches do not compromise the security of systems:
 
 ! Obtain the patch from a known, trusted source;
 ! Verify the integrity of the patch through such means as comparisons of cryptographic hashes to ensure the patch obtained is the correct, unaltered patch;
 ! Apply the patch to an isolated test system and verify that the patch (1) is compatible with other software used on systems to which the patch will be applied, (2) does not alter the system's security posture in unexpected ways, such as altering log settings, and (3) corrects the pertinent vulnerability;
 ! Back up production systems prior to applying the patch;
 ! Apply the patch to production systems using secure methods, and update the cryptographic checksums of key files as well as that system's software archive;
 ! Test the resulting system for known vulnerabilities;
 ! Update the master configurations used to build new systems;
 ! Create and document an audit trail of all changes; and
 ! Seek additional expertise as necessary to maintain a secure computing environment.

Return to the top of the newsletter

INTERNET PRIVACY
We continue our series listing the regulatory-privacy examination questions.  When you answer the question each week, you will help ensure compliance with the privacy regulations.
 
 Examination Procedures (Part 3 of 3)
 
 E. Ascertain areas of risk associated with the financial institution's sharing practices (especially those within Section 13 and those that fall outside of the exceptions ) and any weaknesses found within the compliance management program. Keep in mind any outstanding deficiencies identified in the audit for follow-up when completing the modules.
 
 F. Based on the results of the foregoing initial procedures and discussions with management, determine which procedures if any should be completed in the applicable module, focusing on areas of particular risk. The selection of procedures to be employed depends upon the adequacy of the institution's compliance management system and level of risk identified. Each module contains a series of general instruction to verify compliance, cross-referenced to cites within the regulation. 
 Additionally, there are cross-references to a more comprehensive checklist, which the examiner may use if needed to evaluate compliance in more detail.
 
 G. Evaluate any additional information or documentation discovered during the course of the examination according to these procedures. Note that this may reveal new or different sharing practices necessitating reapplication of the Decision Trees and completion of additional or different modules.
 
 H. Formulate conclusions.
 
 1)  Summarize all findings.
 
 2)  For violation(s) noted, determine the cause by identifying weaknesses in internal controls, compliance review, training, management oversight, or other areas.
 
 3)  Identify action needed to correct violations and weaknesses in the institution's compliance system, as appropriate.
 
 4)  Discuss findings with management and obtain a commitment for corrective action.

 

PLEASE NOTE:  Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.  



Company Information
Yennik, Inc.

4409 101st Street
Lubbock, Texas 79424
Office 806-798-7119
Examiner@yennik.com

 

Please visit our other web sites:
VISTA penetration-vulnerability testing
The Community Banker - Bank FFIEC & ADA Web Site Audits
Credit Union FFIEC & ADA Web Site Audits - Bank Auditing Services
US Banks on the Internet  
US Credit Unions on the Internet

All rights reserved; Our logo is registered with the United States Patent and Trademark Office.
Terms and Conditions, Privacy Statement, © Copyright Yennik, Incorporated